Cybersecurity

Autonomous Threat Hunting: A Future Paradigm for AI-Driven Threat Intelligence

Authors: Siva Raja Sindiramutty | Published: 2023-12-30
Role of AI and Automation
XAI (Explainable AI)
Cybersecurity

SecQA: A Concise Question-Answering Dataset for Evaluating Large Language Models in Computer Security

Authors: Zefang Liu | Published: 2023-12-26
LLM Performance Evaluation
Cybersecurity
Prompt Injection

An Approach to Abstract Multi-stage Cyberattack Data Generation for ML-Based IDS in Smart Grids

Authors: Ömer Sen, Philipp Malskorn, Simon Glomb, Immanuel Hacker, Martin Henze, Andreas Ulbig | Published: 2023-12-21
Cybersecurity
Dataset Generation
Network Node Configuration

Investigation of Multi-stage Attack and Defense Simulation for Data Synthesis

Authors: Ömer Sen, Bozhidar Ivanov, Martin Henze, Andreas Ulbig | Published: 2023-12-21
Cybersecurity
Data Generation
Attack Graph Generation

Purple Llama CyberSecEval: A Secure Coding Benchmark for Language Models

Authors: Manish Bhatt, Sahana Chennabasappa, Cyrus Nikolaidis, Shengye Wan, Ivan Evtimov, Dominik Gabi, Daniel Song, Faizan Ahmad, Cornelius Aschermann, Lorenzo Fontana, Sasha Frolov, Ravi Prakash Giri, Dhaval Kapil, Yiannis Kozyrakis, David LeBlanc, James Milazzo, Aleksandar Straumann, Gabriel Synnaeve, Varun Vontimitta, Spencer Whitman, Joshua Saxe | Published: 2023-12-07
LLM Security
Cybersecurity
Prompt Injection

Understanding (Un)Intended Memorization in Text-to-Image Generative Models

Authors: Ali Naseh, Jaechul Roh, Amir Houmansadr | Published: 2023-12-06
Evolution of AI
Watermarking
Cybersecurity

A Unified Hardware-based Threat Detector for AI Accelerators

Authors: Xiaobei Yan, Han Qiu, Tianwei Zhang | Published: 2023-11-28
FPGA
Cybersecurity
Model Performance Evaluation

Understanding the Process of Data Labeling in Cybersecurity

Authors: Tobias Braun, Irdin Pekaric, Giovanni Apruzzese | Published: 2023-11-28
Cybersecurity
Challenges of Data Labeling
Expert Opinion Collection

Acoustic Cybersecurity: Exploiting Voice-Activated Systems

Authors: Forrest McKee, David Noever | Published: 2023-11-23
Watermarking
Cybersecurity
Speech Synthesis Technology

Security Challenges in Autonomous Systems Design

Authors: Mohammad Hamad, Sebastian Steinhorst | Published: 2023-11-05 | Updated: 2023-12-04
Cybersecurity
Competitive Cooperative Systems
Automated Response to Attacks in Autonomous Systems